Technology Partners

Agari

Akamai

Akamai provides market-leading, cloud-based services for optimizing Web and mobile content and applications, online HD video, and secure e-commerce. Combining highly-distributed, energy-efficient computing with intelligent software, Akamai's global platform is transforming the cloud into a more viable place to inform, entertain, advertise, transact and collaborate. To learn how the world's leading enterprises are optimizing their business in the cloud, follow @Akamai on Twitter.

Anomali

"Anomali helps organizations find and respond to cyber threats. That's our mission. We bring to your security team the one thing that's been missing - external context. With Anomali you can now identify suspicious or malicious traffic before it even reaches your network. We turn threat intelligence into your cyber no-fly list, and seamlessly integrate this with your internal security and IT systems."

Arbor Networks

Arctic Wolf

Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ engineers and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions, and all the expertise and tools required.

Aternity

Aternity monitors any application on any physical, virtual, or mobile device, providing a user-centric vantage point that closes the visibility gap existing with network- and server-centric application performance management tools.

Atlantis Computing

Atlantis Computing is transforming enterprise desktop computing by solving the challenges of desktop virtualization: storage costs, performance, and the impact of security on server density. With Atlantis software, the virtual desktop user experience is better than a physical PC, while at the same time making virtual desktop deployments more affordable to IT organizations by cutting the amount of storage needed, permitting the use of less expensive storage, and increasing performance and densities. Atlantis Computing is privately held and funded by El Dorado Ventures, Partech International and Cisco Systems with U.S. headquarters in Mountain View, California, European headquarters in London, England, and a research and a development center in Bangalore, India.

Avecto

Avecto is an innovator in endpoint security. Avecto’s philosophy of security + freedom promotes a positive user experience across every software implementation, allowing organizations to strike just the right balance. Its unique software, Defendpoint, makes prevention possible, integrating three proactive technologies to stop malware at the endpoint.

Aviatrix

Aviatrix provides an innovative Cloud Networking software solution that simplifies connectivity to the cloud in a secure and scalable way. At Aviatrix, we believe that networking is a foundational element of cloud computing and, should be as dynamic, scalable, and elastic as compute and storage.

BackBox

BackBox is the leading provider for Automated Infrastructure Backup and Recovery solutions. Spanning across the diverse network and security landscape, BackBox will ensure that all supported device configuration files are verified and stored securely in one central location to ensure a speedy recovery, when required. BackBox provides real-time inventory, configuration comparison, and is ideal for any organization, multi-tenant sites and service providers.

Carbon Black

Carbon Black leads a new era of endpoint security by enabling organizations to disrupt advanced attacks, deploy the best prevention strategies for their business, and leverage the expertise of 10,000 professionals from IR firms, MSSPs, and enterprises to shift the balance of power back to security teams. Only Carbon Black continuously records and centrally retains all endpoint activity, making it easy to track an attacker’s every action, instantly scope every incident, unravel entire attacks and determine root causes. Carbon Black also offers a range of prevention options so organizations can match their endpoint defense to their business needs. Carbon Black has been named #1 in endpoint protection, incident response, and market share. Forward-thinking companies choose Carbon Black to arm their endpoints, enabling security teams to: Disrupt. Defend. Unite.

Comtrade

Comtrade is a leading IT company specializing in the fields of software solutions, system integration, and hardware distribution. With a proven track record of delivering innovative IT solutions and services, Comtrade is a trusted technology partner to small, medium, and enterprise businesses.

Congruity

Cortado (formerly ThinPrint)

Cortado links mobile, web, and virtual desktops to centralized IT resources in a highly efficient, secure and manageable way, seamlessly integrating home offices and mobile employees, including those with tablets and complete branch offices, into the existing IT infrastructure. For the more than 15,000 enterprise customers (whose user numbers range from 5 to 100,000), as well as the hundreds of thousands of private users, Cortado continually creates more robust solutions with innovative features and added value. With internationally patented technology, Cortado is the leading provider of software-based print and mobile business solutions.

CrowdStrike

CrowdStrike is a leading provider of next-generation endpoint protection, threat intelligence, and pre and post incident response services. CrowdStrike Falcon is the first true Software as a Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage – even malware-free intrusions.

CyberArk

CyberArk provides solutions for connecting enterprises through its patented Vaulting Technology, including security, performance, and accessibility required to protect the most important corporate data assets.

Darktrace

Without using rules or signatures, Darktrace is uniquely capable of understanding the ‘pattern of life’ of every device, user and network within an organization, and defends against evolving threats that bypass all other systems.

Dell

For more than 28 years, Dell has empowered countries, communities, customers, and people everywhere to use technology to realize their dreams. Customers trust Dell to deliver technology solutions that help them do and achieve more, whether they’re at home, work, school, or anywhere in their world.

Dell EMC

Dell EMC brings together Dell’s and EMC’s respective strong capabilities and complementary portfolios, sales teams and R&D. They seek to become the technology industry’s most trusted advisor, providing capabilities spanning strategy development, consultative services and solution deployment and support to help our customers and partners drive the digital transformation of their businesses.

Duo Security

eG Innovations

eG Innovations provides intelligent performance management solutions that automate and dramatically accelerate the discovery, diagnosis, and resolution of service performance issues in virtual, cloud, and physical service infrastructures.

Embotics

Embotics provides cloud management software that empowers businesses to leverage a comprehensive set of multi-hypervisor virtualization and cloud management capabilities. Embotics software allows IT organizations to deliver IT-as-a-Service from a single console while continuously monitoring resources to optimize automation, deployment, and configuration of IT services across private, public, and hybrid clouds.

ExtraHop

ExtraHop is the leading provider of network-based application performance management (APM) solutions. The ExtraHop Application Delivery Assurance system performs the fastest and deepest analysis in the industry, achieving real-time transaction monitoring at speeds up to a sustained 10Gbps and application-level visibility with no agents, configuration, or overhead. The ExtraHop system quickly auto-discovers and auto-classifies the interdependencies between applications and devices, delivering immediate value within an hour of installation. ExtraHop Networks manages mission-critical, revenue-generating applications across a wide range of industries, including Retail, Healthcare, Financial Services, and Travel/Transportation/Logistics.

FireEye

FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks.

Flexera Software

Flexera Software, formerly Acresso Software, maximizes the value of the software the world develops and uses. The leading provider of FlexNet Manager Suite, FlexNet Producer Suite, InstallShield, and AdminStudio, Flexera Software is trusted by more than 80,000 customers who use their solutions to drive cost and time from the software supply chain.

Forcepoint

Forcepoint™ was created to empower organizations to drive their business forward by safely embracing transformative technologies – cloud, mobility, Internet of Things (IoT), and others – through a unified, cloud-centric platform that safeguards users, networks and data, while eliminating the inefficiencies involved in managing a collection of point security products.

Fortinet

Gemalto

Gemalto is an international digital security company providing software applications, secure personal devices such as smart cards and tokens, and managed services. Gemalto delivers software and other technologies to businesses and governments that help them authenticate identities and protect data.

Globalscape

GlobalSCAPE, Inc. is a worldwide leader in the secure movement and integration of data. Through Globalscape’s powerful yet intuitive technology, organizations can accelerate their digital transformation and maximize their potential by unleashing the power of data.

Illumio

Illumio delivers adaptive security for every computing environment and visualizes application traffic, delivering continuous, scalable, and dynamic policy and enforcement to every server, VM, container, and VDI within data centers and public clouds.

Imperva

Imperva is a pioneer and leader of a new category of data security solutions for high-value business data in the data center. With more than 1,300 end-user customers and thousands of organizations protected through cloud-based deployments, Imperva's customers include leading enterprises, government organizations, and managed service providers who rely on Imperva to prevent sensitive data theft from hackers and insiders.

indeni

indeni proactively troubleshoots your network and security devices to give you real-time, highly relevant information to help you prevent downtime in your network - gone are the days of just relying on SNMP-based monitoring.

Invincea

Invincea is the premier innovator in advanced malware threat detection, end-user threat protection, and pre-breach forensic analysis. Invincea is the only solution on the market that provides enterprise networks with coverage against the largest attack surface for cyber-breach – attacks aimed at users in the form of spear phishing, poisoned search results, and user-initiated infections. The company’s solutions offer a unique ability to protect networks against all types of threats directed at end-users, including zero-days, by seamlessly moving applications that render untrusted content into controlled, secure virtual environments that automatically detect and terminate threats in real time. Invincea’s platform seamlessly moves the browser, PDF reader, Microsoft Office suite, .zip, and .exe file types from the native operating system into fully virtualized and secure environments without changing the user experience.

Ivanti

LANDESK and HEAT Software merged in January 2017 and brought all their various brands (including AppSense) together as Ivanti. Whether you’re looking for systems management, IT asset management solutions, IT service management improvement in the cloud, IT security solutions, or patch management that you can use with or without SCCM, Ivanti stands ready to help.

Juniper Networks

We believe the network is the single greatest vehicle for knowledge, collaboration, and human advancement that the world has ever known. Now more than ever, the world relies on high-performance networks. And now more than ever, the world needs network innovation to unleash our full potential.

Lakeside Software

Lakeside Software transforms the way that enterprises deploy, manage, secure, improve, and report on end user experience by coupling the world’s most lightweight agent with a robust data analysis engine to instantly grant complete visibility and control to administrators without impacting end user experience.

LockPath

LockPath is a market leader in corporate governance, risk management, regulatory compliance (GRC), and information security (InfoSec) software. Built on the patented Dynamic Content Framework (DCF), LockPath's flexible, scalable and fully integrated suite of applications is used by organizations to automate business processes, reduce enterprise risk and demonstrate regulatory compliance to achieve audit-ready status. The applications are designed to manage all facets of compliance and information security programs, including policies and procedures, risk assessment and mitigation, incident tracking and remediation, vulnerability management, third-party management, business continuity planning and audit preparation.

Malwarebytes

Malwarebytes detects and removes malware on an infected computer with industry-leading anti-malware, anti-spyware, and anti-rootkit tech, runs continuously in the background to stop infections before they happen, blocks malicious websites, and uses Chameleon technology to prevent malware from terminating Malwarebytes or modifying its processes.

McAfee

McAfee is one of the world’s leading independent cybersecurity companies. Inspired by the power of working together, McAfee creates business and consumer solutions that make the world a safer place. By building solutions that work with other companies' products, McAfee helps businesses orchestrate cyber environments that are truly integrated, where protection, detection, and correction of threats happen simultaneously and collaboratively. By protecting consumers across all their devices, McAfee secures their digital lifestyle at home and away. By working with other security players, McAfee is leading the effort to unite against cybercriminals for the benefit of all.

Microsoft

Microsoft's mission: Empower every person and every organization on the planet to achieve more. Microsoft's strategy: Build best-in-class platforms and productivity services for a mobile-first, cloud-first world.

NetApp

NetApp brings together the world's most creative and dedicated people to help you affordably store, manage, protect, and retain one of your most precious assets—your data. NetApp has built a reputation for innovative problem solving by creating products and solutions that deliver efficiency savings and enable breakthrough business capabilities.

Nimble Storage

Nutanix

Nutanix delivers an enterprise cloud platform that natively converges compute, virtualization and storage into a resilient, software-defined solution with rich machine intelligence. The world’s most advanced enterprise datacenters rely on Nutanix technology to power their mission-critical workloads at any scale.

NVIDIA

NVIDIA GRID technology offers the ability to offload graphics processing from the CPU to the GPU in virtualized environments, giving the data center manager the freedom to deliver true PC graphics-rich experiences to more virtual users for the first time.

Nyansa

Voyance by Nyansa is the first and only comprehensive user performance management and network assurance platform that analyzes and correlates data across every layer of the network to ensure the best possible user performance. From client data, to data from access network infrastructure elements, application data to WAN data, no more hunting around to determine where network problems impacting user performance are hiding.

Our SaaS platform includes Voyance campus, Voyance WAN and Voyance Client agents that all work together to give IT staff unprecedented control over and knowledge of every client network transaction. Insights in plain English. No more scouring through volumes of log, Wi-Fi, and network data to improve user productivity on the network.

ObserveIT

ObserveIT, a leader in privileged user activity monitoring, allows companies to leverage the benefits of cloud-based and increasingly open IT environments without sacrificing the security of a company's most important asset, its data. By auditing, monitoring, and recording privileged user activity, ObserveIT dramatically reduces the cost and time required for compliance and enables companies to monitor third-party vendor relationships. ObserveIT provides real-time and historical, context-aware video monitoring of privileged user activity for physical, virtual, and cloud-based servers.

Okta

Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security policies. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications.

OneLogin

OneLogin's Unified Access Management Platform unifies access to both SaaS and on-premises applications, as well as a wide range of networks and devices. OneLogin makes it simpler and safer for everyone to access the apps and data they need, anytime and everywhere.

Pivot3

Pivot3, the inventors of software-defined storage and pioneers in hyper-converged infrastructure (HCI) solutions for the data center, offers a range of Enterprise HCI solutions for high performance workloads in data intensive environments. Our patented technology is the result of over a decade of research and development, and continuous optimizations. It is the ideal compute platform for virtual desktop infrastructure (VDI), surveillance, disaster recovery, server virtualization, and more.

Proofpoint

Proofpoint, Inc. is the leading provider of enterprise-class messaging security solutions that protect organizations from the threats and risks of both inbound and outbound email and other messaging streams. Proofpoint's comprehensive platform enables companies to stop spam, defend against viruses and network attacks, and prevent leaks of confidential or sensitive information.

Pulse Secure

Pulse Secure is a leading provider of secure access and mobile security solutions to both enterprises and service providers. Pulse Secure enables worker mobility securely and seamlessly by using the company’s VPN, NAC, and mobile security products.

Quantum

Quantum is a leading expert in scale-out tiered storage, archive and data protection, providing intelligent solutions for capturing, sharing and preserving digital assets over the entire data lifecycle.

Quest

Rapid7

Rapid7 transforms data into action, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.

Resilient, an IBM Company

Resilient’s mission is to help organizations thrive in the face of any cyber attack or business crisis. The award-winning Incident Response Platform (IRP) empowers security teams to analyze, respond to and mitigate incidents faster, smarter, and more efficiently. Part of IBM Security, the Resilient IRP also integrates security technologies into a single hub and provides easy workflow customization and process automation. With Resilient, security teams can have best-in-class response capabilities.

Riverbed

RSA

RSA® Business-Driven Security™ solutions uniquely link business context with security incidents to help organizations manage risk and protect what matters most. RSA solutions are designed to effectively detect and respond to advanced attacks; manage user identities and access; and reduce business risk, fraud and cybercrime. RSA protects millions of users worldwide and works with more than 90 percent of the Fortune 500.

SecurityScorecard

Siemplify

Transforming the way enterprises perform cyber threat analysis, Siemplify is the first security operations platform to employ the same advanced cybersecurity methodologies used by leading military intelligence organizations. The Siemplify Threat Analysis Platform automatically correlates security alerts, identifies and prioritizes incidents, and graphically depicts the complete threat chain, setting new standards for time-to-insight and time-to-remediate. The platform acts as a central hub linking an organization’s existing security, threat intelligence and risk management tools, including Splunk and popular SIEMs, effectively improving the return on those investments.

Sophos

Splunk

Splunk is the leading software platform for machine data that enables customers to gain real-time Operational Intelligence. Splunk’s mission is to address the challenges and opportunities of managing massive streams of machine-generated big data. More than three quarters of the Fortune 100 and thousands of enterprises, universities, government agencies and service providers use Splunk software to harness the power of their machine data for application management, IT operations, security, web intelligence, customer and business analytics and more.

STEALTHbits

Identify threats. Secure data. Reduce risk. STEALTHbits is a leading provider of data security solutions, protecting your most critical assets against today's greatest threats. Founded in 2001, STEALTHbits has extensive experience and deep expertise in the management of Microsoft technologies like Active Directory and Exchange, and governance solutions for unstructured data. With consistent growth, profitability, and a tenured management team that’s been at it since the start, STEALTHbits has emerged as a favorite solution provider for the world’s largest, most notable organizations, as well as a preferred partner to leaders in technology.

Symantec

Symantec is committed to helping you manage the integrity of your information by enabling you to maintain the right balance of information security and availability. In doing so, Symantec is uniquely positioned to help keep your business up, running and growing, no matter what happens.

Syncsort

Syncsort provides fast, secure, enterprise-grade software spanning big data solutions in Hadoop to big iron applications on mainframes. Syncsort helps customers around the world to collect, process and distribute more data in less time, with fewer resources and lower costs.

Tanium

Tenable

Tenable™, Inc. is the Cyber Exposure company. Over 23,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into Tenable.io™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, large government agencies and mid-sized organizations across the private and public sectors.

ThreatQuotient

ThreatQuotient provides ThreatQ, the only Threat Intelligence Platform (TIP) that centrally manages and correlates unlimited external sources with all internal security and analytics solutions for contextual, operationalized intelligence in a single pane of glass. ThreatQ is also the first TIP to provide Indicator Nurturing, which goes beyond enrichment to help customers tailor indicators of compromise (IOCs) specifically to their infrastructure.

Trend Micro

Trend Micro is a global leader in network antivirus and Internet content security software and services. Trend Micro focuses on outbreak prevention and providing customers with a comprehensive approach to managing the outbreak lifecycle and the impact of network worms and virus threats to productivity and information.

Tricerat

Tricerat's virtualization software helps boost performance and system reliability with a wide range of offerings. Simplify Printing eliminates the need for printer driver management. Simplify Profiles, a single-point of control for registry administration, ensures reliability and consistency of registry keys across the server farm. Simplify Lockdown provides the power of published desktops without complex system policies or registry hacks. triCerat's flagship product, Simplify Suite, provides a number of comprehensive desktop management tools in one product offering.

Turbonomic

Turbonomic’s autonomic platform enables heterogeneous environments to self-manage to assure the performance of any application in any cloud. Turbonomic’s patented autonomic decision engine dynamically analyzes application demand and allocates shared resources in real time to maintain a continuous state of application health.

Unidesk (now part of Citrix)

Unidesk is the management platform for Windows app mobility. Unidesk’s layering technology separates Windows apps from infrastructure so they can be managed once and delivered from any end user computing solution, on any cloud, to any device.

Unitrends

Unitrends delivers award-winning business recovery solutions for any IT environment. The company’s portfolio of virtual, physical, and cloud solutions provides adaptive protection for organizations globally. Unitrends delivers end-to-end protection and instant recovery of all virtual and physical assets as well as automated disaster recovery testing built for virtualization.

Veeam

Veeam® has pioneered a new market of Availability for the Always-On Enterprise™ that helps businesses meet recovery time and point objectives (RTPO™) of less than 15 minutes for all applications and data.

Venafi

Venafi protects machine identities for the largest companies on the planet. Leaders in the Global 5000 rely on Venafi to secure the cryptographic keys and digital certificates that authorize and control all machine-to-machine connections and communications.

Veracode

Veracode delivers the application security solutions and services today’s software-driven world requires. Veracode’s unified platform assesses and improves the security of applications from inception through production so that businesses can confidently innovate with the web and mobile applications they build, buy and assemble as well as the components they integrate into their environments.

VMware

VMware, a global leader in cloud infrastructure and business mobility, accelerates our customers’ digital transformation journey by enabling enterprises to master a software-defined approach to business and IT.

Westcon

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments. Zerto’s award winning solution provides enterprises with continuous data replication and recovery designed specifically for virtualized infrastructure and the cloud. Zerto Virtual Replication is the industry’s first hypervisor-based replication solution for tier-one applications, replacing traditional array-based BC/DR solutions that were not built to deal with the virtual paradigm.